fix(kanidm): Revert switch to simpleProxies
All checks were successful
build configuration / build_and_cache_geo01 (push) Successful in 1m11s
build configuration / build_and_cache_rescue01 (push) Successful in 1m17s
build configuration / build_and_cache_storage01 (push) Successful in 1m24s
build configuration / build_and_cache_compute01 (push) Successful in 1m47s
build configuration / build_and_cache_krz01 (push) Successful in 2m14s
build configuration / build_and_cache_geo02 (push) Successful in 1m7s
build configuration / build_and_cache_vault01 (push) Successful in 1m17s
lint / check (push) Successful in 25s
build configuration / build_and_cache_web02 (push) Successful in 1m12s
build configuration / build_and_cache_web01 (push) Successful in 1m44s
build configuration / build_and_cache_bridge01 (push) Successful in 1m7s

As we proxy to an https endpoint, this was not supported
This commit is contained in:
Tom Hubrecht 2024-10-12 22:11:34 +02:00
parent 9ea51137fc
commit 06653220bb
Signed by: thubrecht
SSH key fingerprint: SHA256:r+nK/SIcWlJ0zFZJGHtlAoRwq1Rm+WcKAm5ADYMoQPc

View file

@ -8,9 +8,8 @@
let
inherit (lib) escapeRegex concatStringsSep;
host = "sso.dgnum.eu";
domain = "sso.dgnum.eu";
port = 8443;
domain = host;
cert = config.security.acme.certs.${domain};
@ -41,7 +40,7 @@ in
origin = "https://${domain}";
bindaddress = "127.0.0.1:8443";
bindaddress = "127.0.0.1:${builtins.toString port}";
ldapbindaddress = "0.0.0.0:636";
trust_x_forward_for = true;
@ -53,9 +52,18 @@ in
users.users.kanidm.extraGroups = [ cert.group ];
dgn-web.simpleProxies.kanidm = {
inherit host port;
vhostConfig.locations."/".extraConfig = ''
dgn-web.internalPorts.kanidm = port;
services.nginx = {
enable = true;
virtualHosts.${domain} = {
enableACME = true;
forceSSL = true;
locations."/" = {
proxyPass = "https://127.0.0.1:${builtins.toString port}";
extraConfig = ''
if ( $request_method !~ ^(GET|POST|HEAD|OPTIONS|PUT|PATCH|DELETE)$ ) {
return 444;
}
@ -88,6 +96,8 @@ in
}
'';
};
};
};
networking.firewall.allowedTCPPorts = [ 636 ];
networking.firewall.allowedUDPPorts = [ 636 ];